CVE-2023-40611: Apache Airflow Dag Runs Broken Access Control Vulnerability

Disclosed: 2023-10-27 15:08:33 By hl_k To ibb
Low
Vulnerability Details
##Description: Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. Users should upgrade to version 2.7.1 or later which has removed the vulnerability. ##Vulnerability Exploitation: 1.Select Browse-->DAG Runs, we can see the Dag Run list. {F2691945} 2.Select a Dag, and edit it. {F2691944} 3. We can see that the Conf parameter text box is gray and cannot be edited. The current user does not have permission to modify the Conf value. {F2691946} 4.Click Save to intercept the request message and modify the parameter value of Conf to "1111111111111". {F2691948} 5.Successfully modified beyond permission. {F2691947} ## Impact Broken Access Control
Actions
View on HackerOne
Report Stats
  • Report ID: 2144868
  • State: Closed
  • Substate: resolved
  • Upvotes: 29
Share this report